16 research outputs found

    The Impact of e-Government Dynamic Capabilities on Information Flow Strategies in Disaster Relief Supply Chains: An Inter-Organizational System Perspective

    Get PDF
    History has shown that local, state, and federal governments are not well-equipped with the flexible and responsive abilities necessary to manage the short supply chain life-cycle inherent in providing appropriate disaster relief resources in a timely fashion. Unfortunately, in these unique situations these inefficiencies can cause considerable harm to the citizenry, the financial economy, and the physical infrastructure of the affected area. In this study, we provide an examination of the cross-agency capabilities and relationships that impact the flow of information within disaster relief supply chains. Through an inter-organizational systems approach, a theoretical framework is provided to assess the efficacy of e-government dynamic capabilities in disaster relief supply chains. Future research plans include further developing this conceptual understanding of e-government dynamic capabilities through a qualitative research approach. The results of analyzing the qualitative data will aid in the further development of the proposed research model

    A Tutorial on Using Qlik Analytics Platform for Business Analytics

    Get PDF
    Business Analytics focuses on how businesses, non-profits, and governments use data to gain insights and improve organizational decision-making skills. Due to an increasing availability of large data sets from a variety of sources (Big Data), employees with business analytic skills are in-demand in many industries throughout the world. There are numerous analytics platforms that can be brought into the classroom to introduce students to business analytics concepts. The goal of this tutorial is to familiarize the audience with key aspects of using the Qlik (pronounced Click ) analytics platform - one of the leading commercial business analytics tools on the market according to Gartner\u27s 2018 Magic Quadrant for analytics and business intelligence platforms (Howson, Sallam, & Richa, 2018). The tutorial will be organized into 3 parts: (1) discussion of pros and cons of the top 3 business intelligence platforms - Microsoft\u27s Power BI, Tableau, and Qlik, (2) brief introduction to Qlik and a quick review of its functionality, and (3) a hands-on walk through of an exemplar class project using simple linear regression on healthcare insurance data. The tutorial will conclude with best practices and suggestions for incorporating the Qlik Analytics platform into information systems curriculum at the undergraduate and graduate level

    ENGAGING STUDENTS WITH MOBILE APPLICATION IS CONCEPTS THROUGH CREATING VIDEO VIGNETTES

    Get PDF
    This teaching case presents a method for teaching IS concepts related to mobile commerce through a series of video vignettes. These student-created vignettes provide participants with the opportunity to explore and demonstrate the three key mobile commerce characteristics of Ubiquity, Context Awareness, and Identifiability. These three characteristics are essential to revenue generation and product differentiation for most mobile applications. Most college students use them on a daily basis; however, they are unaware of the strategic importance of these characteristics. Yet, it is the authors’ experience that quantifying, demonstrating, and discussing these concepts present students with significant difficulty. Thus, this case highlights how students in introductory IS courses have an opportunity to investigate and explore IS concepts outside of a traditional classroom format. The hands-on interactive use and demonstration of mobile application features made possible through these video vignettes can lead to measurably increased learning of IS concepts in classroom implementations

    Reducing Misinformation on Social Media Networks

    Get PDF
    This study focuses on examining methods that can potentially reduce the spread of misinformation on major social media networks (SMN) such as Facebook and Twitter. Research finding ways to control the spread of misinformation on SMNs has been emergent. Prior research examined a SMN feature called \u27related articles\u27 to provide context directly under SMN posts with potentially misinformed content about controversial topics. Other research examined how SMN users were encouraged to consume online news sources outside their comfort zone when participating within a socialized environment. Each of these features separately were found to significantly reduced misperceptions of SMN users. In this study, we examine how both of these features can work together to reduce the spread of misinformation. We use an experimental survey to measure the effectiveness of SMN features in correcting misperceptions of SMN users and provide results to inform government, cybersecurity firms, social media companies, and SMN users

    Examining Ethical Decision Making Behavior in e-Learning Systems

    Get PDF
    E-learning is emerging as a way of using technology to re-create a one-on-one learning environment for numerousparticipants at a time and has become prevalent in the higher education arena. In addition to traditional forms of cheating,many universities currently deal with issues of students in traditional classrooms who engage in technology-facilitatedcheating. The propensity for behaving unethically may be significantly greater in an e-learning system due to the lack ofauthority figures. Research states that when placed in a moral situation, individual behavior can be influenced by factors thatare specific to the individual and factors that vary by situation. The focus of this paper is to understand the complexcombination of individual and situational factors that can affect an individual’s behavioral inclinations and provide deeperinsight into how ethical decision-making behaviors differ in a technology-based environment as compared to an in-personenvironment

    Critical Success Factors in Online Multi-Platform Outpost Marketing Strategies

    Get PDF
    Companies, especially small businesses, increasingly rely on marketing activities through multiple social network sites. Social network sites provide access to large customer bases and greatly streamline the costs and technical expertise required to engage in electronic commerce. Research interest focused on the nature of small business e-commerce success has understandably increased in recent years to reflect this new aspect of digital business. Many studies in this area look at individual social network platforms like Facebook, Twitter etc. and attempt to examine the factors that correlate with marketing success. While these studies offer important insight into the challenges faced by small businesses in this area, many studies of a single platform fail to take into account the rapidly increasing variety of social network platforms available to small businesses. It is common today to see a single business participating in multiple social network \u27outposts\u27, or digital spaces within social networks from which companies engage in marketing activities. From a strategic standpoint, each outpost offers unique and valuable customer engagement opportunities. For example, traditional social networks like Facebook have huge advantages in terms of size and scope of their user-base, yet marketing strategies designed to take advantage of these characteristics may vary significantly from new image-based platforms such as Pinterest or Instagram. To succeed in such a complex environment, companies necessarily must incorporate a mix of different techniques and strategies designed to capitalize on the strengths, and offset the weaknesses, of each distinct platform. Researchers can inform marketing strategies to the benefit of many companies. Yet to date the research remains fragmented. Specifically, little research categorizes different outposts in terms of their marketing potential and characteristics, or considers the disparate factors that create successful companies in each outpost. This is the gap filled by this study. We collected data from 100 companies across a mix of four different social network outposts for nine weeks to identify the key factors that determine sales success. Our preliminary empirical analysis shows that critical success factors differ considerably based on interactions between core social network characteristics and a company\u27s product offerings, as well as other factors such as geography, company size and company reputation. Results of the study offer numerous takeaways for both companies that seek to understand the social media challenges that they face as well as social network designers looking to succeed in an increasingly competitive social network ecosphere

    The Role of Social Media and Product Differentiation in Etsy Micro-Manufacturing Shops

    Get PDF
    This research presents an analysis of online micro-manufacturers who sell their handmade and individually customized products by means of the Internet. Using extant literature in the areas of social media and long-tail marketing, this study develops a theoretical model of micro-manufacturing item sales success. In this model, we posit that higher average sales prices for items are associated with the dual aspects of social media proficiency and hyper-differentiation. To examine this model, we present an empirical analysis of a dataset consisting of the marketing and sales activities of 1,386 micro-manufacturers within Etsy, an online commerce platform. Results of the analysis show that micro-manufacturers who achieve greater social media recognition and those who leverage their core competencies around handmade and customized products command higher product sales prices. Therefore, our study offers insights for existing micro-manufacturers and researchers interested in examining the way that niche market micro-manufacturers achieve success online

    Cyber Citizens and Cyber Deviance: Exploring Social and Technical Factors as Antecedents to Cyber Deviance and the Implications for Cyber Citizenship

    Get PDF
    There is an alarming trend of individuals behaving inappropriately with information technology in both organizational and personal settings. For example, in a work context individuals are breaking repeatedly security protocols (Hovav et al. 2011) leading to the compromise of sensitive customer and important organizational data resources. Information systems (IS) researchers have studied the manners by which employees use, and misuse, information technology within organizations (Warkentin et al. 2009). Alternatively, in a non-work context, attention has been given to digital media piracy (Siponen et al. 2012) which continues to plague organizations. These examples illustrate some unacceptable behaviors exhibited by cyber citizens (Anderson et al. 2010) – both in the work and non-work settings. Typically, the boundaries of acceptable and unacceptable cyber behavior are defined by government authorities, who develop laws around specific illegal online behaviors, and businesses, who detail inappropriate actions in their terms of service agreements. Past research has shown that even with detailed guidelines, employees continue to cause breaches in security (Harris 2012) and these actions are greatly influenced by the behaviors of their coworkers (Gallivan et al. 2005). Alternatively, in a non-work environment, computer users operate within a precarious social and technological environment where the guidelines on appropriate behavior are vague (Nowak 2011). In such an ill-defined context, individuals tend to refer to accepted social norms as a guide, rather than try to understand the disparity between laws and policies (Morrison 1994). Research in criminology, sociology, and management, has focused on deviant behaviors with technology, termed cyber deviance. This term refers to inappropriate or criminal behavior in a digital context (Holt et al. 2010). Technical solutions are only marginally effective as deviant cyber behavior continues to proliferate (Rogers et al. 2006). Research has examined individual factors, such as self-control, in order to explain cyber deviant behaviors (Hinduja et al. 2008). Social factors have begun to be examined through the use of social learning theory and social cognitive theory to explain the ways in which attitudes and beliefs influence cyber deviance (Jacobs et al. 2012). Although studies that examine the individual, social, and technical factors have provided insight into cyber deviance behavior, they have not considered such behavior as part of cyber citizenship, where individuals behave in an ethical and productive manner in online environments. Additionally, recent IS research has begun to explore alternative ways to influence social norms and attitudes on individual behaviors in online environments in order to create more conscientious cyber citizens (Anderson et al. 2010). Therefore, this study aims to examine the individual, social, and technical factors that impact one’s intention to engage in cyber deviance. In this study, we focus on the illegal activities that occur in a digital environment. This highlights the unique actions that occur between humans and technology, suggesting this study is best served from such a perspective. Scialdone (2010) provides human computer interaction (HCI) researchers with a useful framework for examining phenomena that occur between humans and technology. Researchers must identify the human, the technology, the tasks, and the context to clearly situate their study in the HCI literature (Scialdone 2010). In this study we focus on average PC users and their interactions in computer-mediated social networks (CMSN). We examine individual factors, Perceived Utility of Cyber Deviance and Self-efficacy in Cyber Deviance; social factors, Cyber Citizen Social Norms on Cyber Deviance, and technical factors, CMSN Influencer and CMSN Intensity. The proposed research methodology is a quantitative approach using a quasi-experimental setup (Bhattacherjee 2012) through the use of scenarios which describe situations of cyber deviance. The use of scenarios allows us to provide a specific situation which serves as a reference point for our inquiry into the concepts of interest (Nagin and Paternoster 1993)

    THE ROLE OF BUSINESS INTELLIGENCE (BI) IN SERVICE INNOVATION: AN AMBIDEXTERITY PERSPECTIVE

    Get PDF
    Advancement in information and communication technologies has been a key driver of the transition from a goods-basedeconomy to a services-based economy where significant changes are occurring in the way that services are produced andconsumed. There is tremendous opportunity to realize business value from service innovation by using the knowledge aboutservices to develop and deliver new information services and business services. Organizations can seize this opportunity touse service innovation initiatives to set themselves apart from competitors. One of the means for organizations to achieveservice innovation is to incorporate business intelligence (BI) both at the strategic and operational levels. A review of extantIS literature on service innovation and BI revealed that the strategic and operational role of BI in fostering service innovationfrom an organizational ambidexterity perspective is one that has not been explored. We address this gap in research bydeveloping a theoretical model and hypotheses to examine the role of BI in service innovation. Our literature review revealedthat firms use BI strategically and operationally for exploration and exploitation respectively to create opportunities forservice innovations which have the potential to impact organizational performance

    Ethical Decision-Making in e-Learning: A Socio-technical Analysis of Informal Security Controls

    Get PDF
    E-learning is emerging as a way of using technology to re-create a one-on-one learning environment for numerousparticipants at a time and has become prevalent in the higher education arena. In addition to traditional forms of cheating,many universities currently deal with issues of students in traditional classrooms who engage in technology-facilitatedcheating. This paper recognizes the socio-technical dimension of security breaches in e-learning. E-learning fraud occurs inthe social context of the class, virtual or traditional, and may involve influences by groups, teachers, other students, and thecontext of the overall university. Research states that when placed in a moral situation, individual behavior can be influencedby factors that are specific to the individual and factors that vary by situation. The focus of this paper is to developpropositions to help understand these behaviors and describe the results of an exploratory qualitative study to examine theperceptions of students in this context. We provide an analysis of this data and examine its utility in the development offuture research in e-learning
    corecore